@solana/web3.js 1.30.3 → 1.31.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/lib/index.cjs.js CHANGED
@@ -15,7 +15,7 @@ var RpcClient = require('jayson/lib/client/browser');
15
15
  var http = require('http');
16
16
  var https = require('https');
17
17
  var secp256k1 = require('secp256k1');
18
- var jsSha3 = require('js-sha3');
18
+ var sha3 = require('js-sha3');
19
19
 
20
20
  function _interopDefaultLegacy (e) { return e && typeof e === 'object' && 'default' in e ? e : { 'default': e }; }
21
21
 
@@ -38,7 +38,6 @@ function _interopNamespace(e) {
38
38
  }
39
39
 
40
40
  var nacl__default = /*#__PURE__*/_interopDefaultLegacy(nacl);
41
- var nacl__namespace = /*#__PURE__*/_interopNamespace(nacl);
42
41
  var BN__default = /*#__PURE__*/_interopDefaultLegacy(BN);
43
42
  var bs58__default = /*#__PURE__*/_interopDefaultLegacy(bs58);
44
43
  var BufferLayout__namespace = /*#__PURE__*/_interopNamespace(BufferLayout);
@@ -47,6 +46,7 @@ var RpcClient__default = /*#__PURE__*/_interopDefaultLegacy(RpcClient);
47
46
  var http__default = /*#__PURE__*/_interopDefaultLegacy(http);
48
47
  var https__default = /*#__PURE__*/_interopDefaultLegacy(https);
49
48
  var secp256k1__default = /*#__PURE__*/_interopDefaultLegacy(secp256k1);
49
+ var sha3__default = /*#__PURE__*/_interopDefaultLegacy(sha3);
50
50
 
51
51
  const toBuffer = arr => {
52
52
  if (buffer.Buffer.isBuffer(arr)) {
@@ -2029,9 +2029,9 @@ class Account {
2029
2029
  this._keypair = void 0;
2030
2030
 
2031
2031
  if (secretKey) {
2032
- this._keypair = nacl__namespace.sign.keyPair.fromSecretKey(toBuffer(secretKey));
2032
+ this._keypair = nacl__default["default"].sign.keyPair.fromSecretKey(toBuffer(secretKey));
2033
2033
  } else {
2034
- this._keypair = nacl__namespace.sign.keyPair();
2034
+ this._keypair = nacl__default["default"].sign.keyPair();
2035
2035
  }
2036
2036
  }
2037
2037
  /**
@@ -7317,7 +7317,7 @@ class Keypair {
7317
7317
  if (keypair) {
7318
7318
  this._keypair = keypair;
7319
7319
  } else {
7320
- this._keypair = nacl__namespace.sign.keyPair();
7320
+ this._keypair = nacl__default["default"].sign.keyPair();
7321
7321
  }
7322
7322
  }
7323
7323
  /**
@@ -7326,7 +7326,7 @@ class Keypair {
7326
7326
 
7327
7327
 
7328
7328
  static generate() {
7329
- return new Keypair(nacl__namespace.sign.keyPair());
7329
+ return new Keypair(nacl__default["default"].sign.keyPair());
7330
7330
  }
7331
7331
  /**
7332
7332
  * Create a keypair from a raw secret key byte array.
@@ -7343,14 +7343,14 @@ class Keypair {
7343
7343
 
7344
7344
 
7345
7345
  static fromSecretKey(secretKey, options) {
7346
- const keypair = nacl__namespace.sign.keyPair.fromSecretKey(secretKey);
7346
+ const keypair = nacl__default["default"].sign.keyPair.fromSecretKey(secretKey);
7347
7347
 
7348
7348
  if (!options || !options.skipValidation) {
7349
7349
  const encoder = new TextEncoder();
7350
7350
  const signData = encoder.encode('@solana/web3.js-validation-v1');
7351
- const signature = nacl__namespace.sign.detached(signData, keypair.secretKey);
7351
+ const signature = nacl__default["default"].sign.detached(signData, keypair.secretKey);
7352
7352
 
7353
- if (!nacl__namespace.sign.detached.verify(signData, signature, keypair.publicKey)) {
7353
+ if (!nacl__default["default"].sign.detached.verify(signData, signature, keypair.publicKey)) {
7354
7354
  throw new Error('provided secretKey is invalid');
7355
7355
  }
7356
7356
  }
@@ -7365,7 +7365,7 @@ class Keypair {
7365
7365
 
7366
7366
 
7367
7367
  static fromSeed(seed) {
7368
- return new Keypair(nacl__namespace.sign.keyPair.fromSeed(seed));
7368
+ return new Keypair(nacl__default["default"].sign.keyPair.fromSeed(seed));
7369
7369
  }
7370
7370
  /**
7371
7371
  * The public key for this keypair
@@ -8257,7 +8257,7 @@ class Secp256k1Program {
8257
8257
  assert(publicKey.length === PUBLIC_KEY_BYTES, `Public key must be ${PUBLIC_KEY_BYTES} bytes but received ${publicKey.length} bytes`);
8258
8258
 
8259
8259
  try {
8260
- return buffer.Buffer.from(jsSha3.keccak_256.update(toBuffer(publicKey)).digest()).slice(-ETHEREUM_ADDRESS_BYTES);
8260
+ return buffer.Buffer.from(sha3__default["default"].keccak_256.update(toBuffer(publicKey)).digest()).slice(-ETHEREUM_ADDRESS_BYTES);
8261
8261
  } catch (error) {
8262
8262
  throw new Error(`Error constructing Ethereum address: ${error}`);
8263
8263
  }
@@ -8355,7 +8355,7 @@ class Secp256k1Program {
8355
8355
  const privateKey = toBuffer(pkey);
8356
8356
  const publicKey = publicKeyCreate(privateKey, false).slice(1); // throw away leading byte
8357
8357
 
8358
- const messageHash = buffer.Buffer.from(jsSha3.keccak_256.update(toBuffer(message)).digest());
8358
+ const messageHash = buffer.Buffer.from(sha3__default["default"].keccak_256.update(toBuffer(message)).digest());
8359
8359
  const {
8360
8360
  signature,
8361
8361
  recid: recoveryId